MS15-005: Vulnerability in Network Location Awareness Service Could Allow Security Feature Bypass (3022777)

This script is Copyright (C) 2015-2017 Tenable Network Security, Inc.


Synopsis :

The remote Windows host is affected by a security bypass
vulnerability.

Description :

The Network Location Awareness (NLA) service on the remote host is
affected by a security bypass vulnerability due to a failure to
validate whether it is connected to a trusted domain or an untrusted
network. This could cause the system to unintentionally configure
applications insecurely (e.g. the firewall policy) when connecting to
an untrusted network. An attacker on the same network can exploit this
by spoofing responses to DNS or LDAP requests made by the targeted
system.

Note that Microsoft has no plans to release an update for Windows 2003
even though it is affected by this vulnerability.

See also :

https://technet.microsoft.com/library/security/MS15-005

Solution :

Microsoft has released a set of patches for Windows Vista, 2008, 7,
2008 R2, 8, 2012, 8.1, and 2012 R2.

Risk factor :

Medium / CVSS Base Score : 5.8
(CVSS2#AV:A/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 4.3
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Windows : Microsoft Bulletins

Nessus Plugin ID: 80494 ()

Bugtraq ID: 71930

CVE ID: CVE-2015-0006

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now